Sciweavers

MOBICOM
1997
ACM
14 years 4 months ago
A Protection Scheme for Mobile Agents on Java
: This paper describes a protection scheme for mobile agents implemented on a Java environment. In this scheme, access to objects is controlled by means of software capabilities th...
Daniel Hagimont, Leila Ismail
SUTC
2006
IEEE
14 years 6 months ago
The Computational Complexity of Enforceability Validation for Generic Access Control Rules
In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified...
Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo
RULEML
2007
Springer
14 years 6 months ago
Specifying Process-Aware Access Control Rules in SBVR
Abstract. Access control is an important aspect of regulatory compliance. Therefore, access control specifications must be process-aware in that they can refer to an underlying bu...
Stijn Goedertier, Christophe Mues, Jan Vanthienen
MCETECH
2009
Springer
14 years 7 months ago
A Non-technical User-Oriented Display Notation for XACML Conditions
Access control rules are currently administered by highly qualified personnel. Thus, the technical barrier that specialized access control languages represent naturally prevents th...
Bernard Stepien, Amy P. Felty, Stan Matwin
WWW
2006
ACM
15 years 1 months ago
Using semantic rules to determine access control for web services
Semantic Web technologies are bring increasingly employed to solve knowledge management issues in traditional Web technologies. This paper follows that trend and proposes using Se...
Brian Shields, Owen Molloy, Gerard Lyons, Jim Dugg...